06-09-2020, 05:11 PM
(This post was last modified: 06-09-2020, 05:12 PM by AnApprentice.)
Hey all, first post here.
So i got a handshake of my AP and i can successfully crack it on a virtual machine (using aircrack and hashcat).
But when i tried to do it on windows using hashcat (because i found that it's way faster since it's uses the GPU), it doesn't work.
I'm only putting the correct password in the wordlist, but it just doesn't find it...
Command: .\hashcat64.exe -a 0 -m 2500 CaptureWayfay.hccapx top1.txt --self-test-disable
![[Image: unknown.png?width=504&height=427]](https://media.discordapp.net/attachments/562805535846563844/719892156952608828/unknown.png?width=504&height=427)
![[Image: unknown.png]](https://media.discordapp.net/attachments/562805535846563844/719892189152542780/unknown.png)
Thanks in advance for your answers and sorry if this is considered a dumb question.
Have a nice day.
So i got a handshake of my AP and i can successfully crack it on a virtual machine (using aircrack and hashcat).
But when i tried to do it on windows using hashcat (because i found that it's way faster since it's uses the GPU), it doesn't work.
I'm only putting the correct password in the wordlist, but it just doesn't find it...
Command: .\hashcat64.exe -a 0 -m 2500 CaptureWayfay.hccapx top1.txt --self-test-disable
![[Image: unknown.png?width=504&height=427]](https://media.discordapp.net/attachments/562805535846563844/719892156952608828/unknown.png?width=504&height=427)
![[Image: unknown.png]](https://media.discordapp.net/attachments/562805535846563844/719892189152542780/unknown.png)
Thanks in advance for your answers and sorry if this is considered a dumb question.
Have a nice day.